Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html | Third Party Advisory |
http://www.securityfocus.com/bid/98314 | Third Party Advisory VDB Entry |
https://bugzilla.suse.com/show_bug.cgi?id=1033948 | Issue Tracking Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2017-05-03 19:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-7995
Mitre link : CVE-2017-7995
CVE.ORG link : CVE-2017-7995
JSON object : View
Products Affected
novell
- suse_linux_enterprise_point_of_sale
- suse_linux_enterprise_server
suse
- manager
- openstack_cloud
- manager_proxy
xen
- xen
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor